General

  • Target

    Multiloader.exe

  • Size

    18.7MB

  • Sample

    241112-e3g8taxrfl

  • MD5

    fbd54e8bf5a7aadb27075022aa967b0d

  • SHA1

    eaca19324dd3c85faea7b35d5c71d83d11a14b90

  • SHA256

    f9e68a96af0f8b93949c85ff7262a7a0b0fe556242f19288ff5da0da7131e85d

  • SHA512

    cfe290e22b6a651f260710d5430eb59cb7a4e4b9e60bc02c42b689e8cab707bccd153c786b87d70a714a1fcab24deb48e55eb31e4bcad249941a00ae33fdc857

  • SSDEEP

    393216:xpqPnLFXlryQMDOETgs77fGCg7qsbvExEjwKY2Pqo:+PLFXNyQRE7LIYFK2o

Malware Config

Targets

    • Target

      Multiloader.exe

    • Size

      18.7MB

    • MD5

      fbd54e8bf5a7aadb27075022aa967b0d

    • SHA1

      eaca19324dd3c85faea7b35d5c71d83d11a14b90

    • SHA256

      f9e68a96af0f8b93949c85ff7262a7a0b0fe556242f19288ff5da0da7131e85d

    • SHA512

      cfe290e22b6a651f260710d5430eb59cb7a4e4b9e60bc02c42b689e8cab707bccd153c786b87d70a714a1fcab24deb48e55eb31e4bcad249941a00ae33fdc857

    • SSDEEP

      393216:xpqPnLFXlryQMDOETgs77fGCg7qsbvExEjwKY2Pqo:+PLFXNyQRE7LIYFK2o

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks